Alice Silverberg

According to our database1, Alice Silverberg authored at least 30 papers between 2000 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Quantum Money from Quaternion Algebras.
IACR Cryptol. ePrint Arch., 2021

2020
Mathematics and Cryptography: A Marriage of Convenience?
IACR Cryptol. ePrint Arch., 2020

Mathematics and Cryptography: A Marriage of Convenience? - Invited Talk.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Testing Isomorphism of Lattices over CM-Orders.
SIAM J. Comput., 2019

2018
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves.
IACR Cryptol. ePrint Arch., 2018

Algorithms for Commutative Algebras Over the Rational Numbers.
Found. Comput. Math., 2018

2017
Lattices with Symmetry.
J. Cryptol., 2017

Roots of Unity in Orders.
Found. Comput. Math., 2017

2016
A framework for deterministic primality proving using elliptic curves with complex multiplication.
Math. Comput., 2016

Determining cyclicity of finite modules.
J. Symb. Comput., 2016

2015
Isogenies of abelian varieties over finite fields.
Des. Codes Cryptogr., 2015

2014
Revisiting the Gentry-Szydlo Algorithm.
IACR Cryptol. ePrint Arch., 2014

Some remarks on primality proving and elliptic curves.
Adv. Math. Commun., 2014

2013
Fully Homomorphic Encryption for Mathematicians.
IACR Cryptol. ePrint Arch., 2013

2010
Choosing the correct elliptic curve in the CM method.
Math. Comput., 2010

2009
Using Abelian Varieties to Improve Pairing-Based Cryptography.
J. Cryptol., 2009

Finding composite order ordinary elliptic curves using the Cocks-Pinch method.
IACR Cryptol. ePrint Arch., 2009

2008
Compression in Finite Fields and Torus-Based Cryptography.
SIAM J. Comput., 2008

Applications to cryptography of twisting commutative algebraic groups.
Discret. Appl. Math., 2008

2004
Using primitive subgroups to do more with fewer bits.
IACR Cryptol. ePrint Arch., 2004

Practical Cryptography in High Dimensional Tori.
IACR Cryptol. ePrint Arch., 2004

2003
Applications of list decoding to tracing traitors.
IEEE Trans. Inf. Theory, 2003

Torus-based cryptography.
IACR Cryptol. ePrint Arch., 2003

2002
The best and worst of supersingular abelian varieties in cryptology.
IACR Cryptol. ePrint Arch., 2002

Hierarchical ID-Based Cryptography.
IACR Cryptol. ePrint Arch., 2002

Applications of Multilinear Forms to Cryptography.
IACR Cryptol. ePrint Arch., 2002

Supersingular Abelian Varieties in Cryptology.
Proceedings of the Advances in Cryptology, 2002

2001
Efficient Traitor Tracing Algorithms using List Decoding.
IACR Cryptol. ePrint Arch., 2001

Rank Frequencies for Quadratic Twists of Elliptic Curves.
Exp. Math., 2001

2000
Ranks of Elliptic Curves in Families of Quadratic Twists.
Exp. Math., 2000


  Loading...